Bitcoin Forum
June 25, 2024, 06:18:15 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 [49] 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 »
961  Other / Meta / Re: [ANN] Bitcoin Foundation on: September 29, 2012, 11:31:49 PM
Ok, so first, I did not create this thread, Theymos did.

Concerning the deleted post, I quoted a number of especially trollish statements to the effect that the "end is nigh", because, you know, Bitcoin Foundation. And noted how the quoted segments fit the definition of trolling ecactly. I then (stupidly perhaps) embedded a GIF saying don't feed the trolls. I guess trolling is okay, but recommending that people don't feed the trolls is not.

Mea culpa.

Concerning the edited post: Theymos, are you able to figure out who blanked out the link(s) in my post?



Lastly, since this is now apparently in META:
May I suggest that one should receive an automated notification upon being moderated,
so that people can actually learn from their transgressions?

One should know what has been moderated, and when.
The reason for being moderated can be omitted, so as not to add to the burden of the moderators.

Preferably, the offending post should be visible to the poster, mods and admins only.
962  Other / Meta / Re: [ANN] Bitcoin Foundation on: September 29, 2012, 10:37:46 PM
First, you edited my OP and broke all of the links changing .org to .com.
Then you sent me a PM asking if it would be ok to move this thread to Service Discussion.  WTF?  If discussion of the Foundation isn't a good topic for the main Discussion forum what is?

Woah.  That is a significant abuse of moderator power.

Has hazek edited any of your other posts?
Has hazek edited any of my posts?
Has hazek edited any of satoshi's old posts?

Editing another's posts is far worse than deletion, when it comes to abuse of moderator powers.  That is misrepresenting someone else's identity.


First, I had one of my posts (which was friendly to the Bitcoin Foundation) deleted.

Second, and more curiously, one of the links in this post was changed (not by me) to simply: "http://"

There are two bad links in the announcement:

(1) ... see the Linux Foundation website ... should link to http://www.linuxfoundation.org
(2) ... Peter's "Letter from the Executive Director" ... should link to https://bitcoinfoundation.org/about/letter



That said: Wooooooo! Yes! This is REALLY good news and a big step, nay, a big leap in the right direction.

Quote
Create an opt-in certification process for Bitcoin businesses.

Sanity checks are coming!!! I'm happy all over. Will be signing up pretty much immediately.

Since I received no notification of my posts being edited/deleted or otherwise moderated,
my first thought was that perhaps my account had been hacked.  Undecided
963  Economy / Speculation / Re: Bitcoin Trade Volume 24h Periodicity on: September 29, 2012, 06:29:36 PM
But this shows that Bitcoin is currently more ameripean than global.
964  Bitcoin / Bitcoin Discussion / Re: Bitcoin-Qt/bitcoind version 0.7.0 released - URI problems on Windows on: September 29, 2012, 01:29:38 PM

Can you please change
Code:
"C:\Program Files (x86)\Bitcoin\bitcoin-qt.exe" "$1"
into
Code:
"C:\Program Files (x86)\Bitcoin\bitcoin-qt.exe" "%1"
and report back!


Changed the "$1" part of the registry value to "%1". Works fine now.

I believe I upgraded to 0.7 from 0.6.2. Possibly from 0.6.3. (Not from an RC version.)

Would forcing the registry value to "%1" during installation break anything?

Thanks for the help. Smiley
965  Economy / Speculation / Re: Will the effect the BTC market? on: September 29, 2012, 12:29:35 AM
FUCK
This is bad. Real bad.  Shocked

Why? 5 blocks in a row and appearing fully legit.

False alarm. See the last post in that thread.
966  Bitcoin / Bitcoin Discussion / Re: Bitcoin Foundation AMA at Reddit starting in 50 minutes on: September 28, 2012, 09:48:26 PM
Is there a reason you're answering questions there are opposed to here?

Uhh, have a look at the announcement thread. Yeah. There's a reason.
967  Bitcoin / Bitcoin Discussion / Re: Is Bitcoin currently under attack? on: September 28, 2012, 08:21:27 PM
Well I was wondering how long it would take for people to notice. It's me
And no I am not putting lots of hashing power to the network, notice that it just says "relayed by" and not "mined by". I'm performing some measurements, paper is due in a few weeks.

Cool. Well, today I learned a bunch of arcana about relaying versus mining blocks.
What, exactly, are you measuring? How many people are grappling with Bitcoin at ETH Zürich?


thank you! due your work I came under attack of some moderators and some pool operators (which I really like!)


Well that's a weird way to look at it. They happened to be right, and we happened to be wrong.
There is not much honor in being a fool, but there can be some merit in admitting the mistake.

Now, what we should do is learn from the experience, and only then feel good about ourselves.
968  Economy / Speculation / Re: Bitcoin Trade Volume 24h Periodicity on: September 28, 2012, 07:28:51 PM
I disagree. This whole article seems speculative, like it admits towards the end. There can be price rise without volume rise, only after some time this trend becomes validated by a rise in volume or it collapses if no volume rise sets in. The premise price>follows>volume is not (always) true. Also I fail to see how some "Volume Cycle Sequences" needs to be completed before a trend change can happen. If you take a look at historic charts (e.g. the Jan '12 to March '12 period in total) no "Volume cycles" are completed and yet the trend changes.

@ OP: Nice visualization of volume patterns! I couldnt have put it better. The peaks always seem to confluence with early evening hours of the US East Coast. Too bad I have to stay up so long to catch that time frame from where I am (Germany) :X

Yeah, I quoted this mostly because it was so damn bold. (And hence, very likely wrong.)  Smiley

Any statement of the form: The market...always...something will always be wrong. (At least once, and likely often.)
969  Other / Beginners & Help / Re: looking for cpu programmer on: September 28, 2012, 07:22:36 PM
I will pay 100 bitcoins for a valid proof (or disproof) of the Riemann hypothesis.*

*Since this is contract work, I will retain copyright to the solution in the capacity of being your publisher,
970  Bitcoin / Bitcoin Technical Support / Re: Peer 82.130.xx.xx connected to me 3 times, sending constant pings? on: September 28, 2012, 06:19:18 PM
Their public http server has a file named BitThief.exe
Wallet stealer?

I believe BitThief was shown to be non-bitcoin related.

It seems like Bitthief is not related to Bitcoins:

http://bitthief.ethz.ch/

971  Economy / Service Discussion / Re: Bitfloor CrowdSource Recovery Proposal: 224 1k Investors on: September 28, 2012, 04:18:23 PM
Post count of 13? Who are you and why should we care?

Uhm, post count is worse than useless when it comes to the validity of an argument.

If anything, post count on Bitcointalk often seems to be somehow inversely related to common sense, intelligence, and verbal ability.

Therefore, the more you post, the dumber you get. (I'm mostly joking. Mostly.) Wink

Also, this wouldn't be a first. Or second. MtGox in July 2011 was the first. Bitomat was the second. Everyone who lost money in those two cases was made whole.

MtGox had the more than enough revenue to make everyone whole. Bitomat was bought out by MtGox as an act of good faith.

Bitfloor doesn't have nearly enough revenue, and MtGox is not going to buy them out.

It seems to me that your objection is quite irrelevant to Bitfloor hostage situation.
972  Bitcoin / Mining / Re: Swiss University jumps into mining game (82.130.102.160) on: September 28, 2012, 04:02:59 PM
So let me get this straight? They're not trying a sustained 51% attack...that would take too much power. Instead they're running at about 8-9% of the network, and hoping to get 6 blocks in a row to reverse a transaction (double spending)?

http://bgp.he.net/ip/82.130.102.160

ETH Zürich have been experimenting with fast double spend attacks, and is currently (as of today) bringing massive mining power to bear on the main network.

Their public http server has a file named BitThief.exe on it, and they're spamming ping messages. (Denial of Service?) Did i miss anything?
973  Bitcoin / Mining / Re: Swiss University jumps into mining game (82.130.102.160) on: September 28, 2012, 03:49:11 PM
Reading their paper, it seems that their goal is to send coins to one address, but after that confirm a spending of the same coins to their own address by their miners.

One should note that the "Fast Double Spend" paper has already been submitted to,
accepted by, and is due to be presented on the ACM CCS 2012 conference in about two weeks.

So: Whatever they are doing now, it is not related to that specific paper.
974  Bitcoin / Mining / Re: Swiss University jumps into mining game (82.130.102.160) on: September 28, 2012, 03:25:44 PM
More ETH Zürich shenanigans:

Peer 82.130.xx.xx connected to me 3 times, sending constant pings?

Some kind of DDOS attack this time?
975  Bitcoin / Bitcoin Technical Support / Re: Peer 82.130.xx.xx connected to me 3 times, sending constant pings? on: September 28, 2012, 03:19:34 PM
http://bgp.he.net/ip/82.130.102.160

ETH Zürich have been experimenting with fast double spend attacks, and is currently (as of today) bringing massive mining power to bear on the main network.

Their public http server has a file named BitThief.exe on it, and they're spamming ping messages. (Denial of Service?) Did i miss anything?
976  Bitcoin / Mining / Re: Swiss University jumps into mining game (82.130.102.160) on: September 28, 2012, 02:42:41 PM
Unless you have 51% of the whole network's hashing power right?

No, it's still exponentially difficult over larger numbers of blocks. (Page 8 in the Satoshi whitepaper)

Edit: I may have been wrong about this.

The Bitcoin whitepaper doesn't discuss cases where the attacker's mining power is above 0.3

By Satoshi's analysis, doesn't it get exponentially hard for honest miners to catch up to an attacker, if the attacker controls >50% of mining power, not just blocks solved?

Haven't thought much about majority attack feasibility before today.



Thankfully: "[2] In our experiments, we solely used Bitcoin wallets and
accounts that we own; other Bitcoin users were not affected by our experiments."

These guys didn't steal anyone else's money. But there is a flip side to that coin.
977  Bitcoin / Mining / Re: Swiss University jumps into mining game (82.130.102.160) on: September 28, 2012, 02:28:04 PM
I dont know whether they mine with full power yet, but its not 51%, its 8.547% actually.


Number of Blocks relayed by 82.130.102.160: 20
First block relayed at Blockheight: 200691
Current Blockheight: 200925
dBlockheight=200925-200691=234 -> they have competed for 234 blocks yet

20/234*100%= 8.547%

They have currently relayed 8.547% of all blocks they have competed for.


what is the timeframe for an 51% attack. 6 blocks?

IIRC, maintaining a supermajority attack gets exponentially hard over n-blocks.

Hence: "Double-Spending Attacks on Fast Payments in Bitcoin"
978  Bitcoin / Mining / Re: Swiss University jumps into mining game (82.130.102.160) on: September 28, 2012, 02:24:44 PM
Swiss... they have something to defend

Yes. Bitcoin is the new Swiss Bank Account.  Wink

This is not a bad thing. That is a legitimate organization, they are not doing it with hostile intent. Very interesting though!

Of course ETH Zürich is legitimate. However, they could still be Bitcoin hostile.  Smiley

It's a relief to see that this is a research operation. I'd be rather more concerned if this was an unidentified organization with unknown intent.

I was quite astounded to discover that their group (or indeed any organization) was able to roll out enough mining power to find 7 blocks in 70 minutes.

Pretty impressive, if it's just for a feasibility experiment.
979  Bitcoin / Mining / Re: Swiss University jumps into mining game (82.130.102.160) on: September 28, 2012, 02:17:52 PM
Quote
... Until now, double-spending attacks on fast pay-
ments in Bitcoin or mechanisms for their prevention
have not been studied. In this work, we analyze
double spending attacks in detail and we demon-
strate that double-spending attacks can be mounted
on currently deployed version of Bitcoin, when used
in fast payments. We further show that the measures
recommended by Bitcoin developers for fast trans-
actions are not always effective in resisting double-
spending; we argue that if those recommendations
are followed, double-spending attacks on Bitcoin
are still possible. Finally, we propose a lightweight
countermeasure to detect double-spending attacks in
fast transactions.

More specifically, our contributions in this paper
can be summarized as follows:


We measure and analyze the time required to con-
firm transactions in Bitcoin. Our analysis shows
that transaction confirmation in Bitcoin can be
modeled with a shifted geometric distribution and
that, although the average time to confirm transac-
tions is almost 10 minutes, its standard deviation is
approximately 15 minutes. We argue that this hin-
ders the reliance of transaction confirmation when
dealing with fast payment scenarios.

We thoroughly analyze the conditions for perform-
ing successful double-spending attacks against fast
payments in Bitcoin. We then present the first
comprehensive double-spending measurements in
Bitcoin. Our experiments were conducted us-
ing modified Bitcoin clients running on a hand-
ful of hosts located around the globe. Our results
demonstrate the feasibility and easy realization of
double-spending attacks in current Bitcoin client
implementations.

We explore and evaluate empirically a number of
solutions for preventing double-spending attacks
against fast payments in Bitcoin. We show that the
recommendations of Bitcoin developers on how to
counter double-spending are not always effective.
Leveraging on our results, we propose a lightweight
countermeasure that enables the secure verification
of fast payments. ...
980  Bitcoin / Mining / Re: Swiss University jumps into mining game (82.130.102.160) on: September 28, 2012, 01:58:07 PM
http://www.syssec.ethz.ch/research/Bitcoin

Quote from: ETH Zurich - System Security Group - Research - Publications

Double-Spending Fast Payments in Bitcoin

This site is under construction.

 Shocked



Update 1:

CCS 2012 19th ACM Conference on Computer and Communications Security
Oct. 16-18, 2012, Sheraton Raleigh Hotel, Raleigh, NC, USA

http://www.sigsac.org/ccs/CCS2012/techprogram.shtml
   
Double-Spending Fast Payments in Bitcoin
Ghassan O. Karame (NEC Laboratories Europe), Elli Androulaki (ETH Zurich), Srdjan Capkun (ETH Zurich)

Update 2: Found it! Smiley

http://eprint.iacr.org/2012/248.pdf

Reading the paper now.

Update 3: Abstract

Quote
Bitcoin is a decentralized payment system that is
based on Proof-of-Work. Bitcoin is currently gaining
popularity as a digital currency; several businesses
are starting to accept Bitcoin transactions.
An example case of the growing use of Bitcoin was recently
reported in the media; here, Bitcoins were used as a
form of fast payment in a local fast-food restaurant.

In this paper, we analyze the security of using
Bitcoin for fast payments, where the time between
the exchange of currency and goods is short (i.e.,
in the order of few seconds). We focus on doublespending attacks on fast payments and demonstrate
that these attacks can be mounted at low cost on
currently deployed versions of Bitcoin. We further
show that the measures recommended by Bitcoin developers for the use of Bitcoin in fast transactions are
not always effective in resisting double-spending; we
show that if those recommendations are integrated
in future Bitcoin implementations, double-spending
attacks on Bitcoin will still be possible. Finally, we
leverage on our findings and propose a lightweight
countermeasure that enables the detection of doublespending attacks in fast transactions.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 [49] 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!